ARTICLES

Is 2019 the Worst Year for Data Breaches

Data Breaches have become worse as 7.9 Billion records exposed in the first nine months of 2019. Read on to know more... Data Breaches have...

CERTrating: The New Tool to Help Evaluate CERT/CSIRT Maturity Level

The Global Cyber Security Center has developed a new tool named CERTrating to evaluate the maturity level of CERT/CSIRT. Read on to know more... In...

Can Hackers Steal Your Personal Data through Smart Light Bulbs

Researchers found out that the invisible wave spectrum in the smart bulbs could be intercepted by the hackers. Read on to know more... Smart bulbs...

How Hackers Can Install Malware in Your Smartphone through NFC

Few months back, researchers discovered that hackers can use NFC to install malware in your Android smartphones. Read on to know more... Few months back,...

NEWS

Japan’s LINE launches public bug bounty program with HackerOne

One of the biggest messenger apps in the world invites hackers to proactively report security vulnerabilities to enhance cybersecurity HackerOne announced the launch of LINE...

Cyber Adversaries Reincorporate Old-School Tactics to Catch Organizations Off-Guard

Cyber Adversaries Reincorporate Old-School Tactics to Catch Organizations Off-Guard Ahead of Busy Holiday Season Fortinet today announced the findings of its latest quarterly Global Threat...

CISA issues a security alert for holiday shopping and phishing scams

Source: Cyware | By Ryan Stewart • The initiative has been taken anticipating the soon-to-come holiday season. • Scams accelerate during the holiday season as local...

Tech Support Scammers Exploiting Unpatched Firefox Bug

Source: SW | By Eduard Kovacs Mozilla is working on addressing a Firefox bug that has been exploited by tech support scammers to lock the...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...